These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

174 related articles for article (PubMed ID: 28566992)

  • 1. Mobile Device Security: Perspectives of Future Healthcare Workers.
    Hewitt B; Dolezel D; McLeod A
    Perspect Health Inf Manag; 2017; 14(Winter):1c. PubMed ID: 28566992
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Perceived security of BYOD devices in medical institutions.
    Alexandrou A; Chen LC
    Int J Med Inform; 2022 Dec; 168():104882. PubMed ID: 36242855
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Bring-your-own-device in medical schools and healthcare facilities: A review of the literature.
    Kadimo K; Kebaetse MB; Ketshogileng D; Seru LE; Sebina KB; Kovarik C; Balotlegi K
    Int J Med Inform; 2018 Nov; 119():94-102. PubMed ID: 30342692
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Mobile health requires mobile security: challenges, solutions, and standardization.
    Pharow P; Blobel B
    Stud Health Technol Inform; 2008; 136():697-702. PubMed ID: 18487813
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Analysis of Security Protocols for Mobile Healthcare.
    Wazid M; Zeadally S; Das AK; Odelu V
    J Med Syst; 2016 Nov; 40(11):229. PubMed ID: 27640159
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Accessing best practice resources using mobile technology in an undergraduate nursing program: a feasibility study.
    Mann EG; Medves J; Vandenkerkhof EG
    Comput Inform Nurs; 2015 Mar; 33(3):122-8. PubMed ID: 25636042
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Implementing healthcare information security: standards can help.
    Orel A; Bernik I
    Stud Health Technol Inform; 2013; 186():195-9. PubMed ID: 23542997
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Wearable devices in healthcare: Privacy and information security issues.
    Cilliers L
    Health Inf Manag; 2020; 49(2-3):150-156. PubMed ID: 31146589
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Technical solutions for mitigating security threats caused by health professionals in clinical settings.
    Fernandez-Aleman JL; Belen Sanchez Garcia A; Garcia-Mateos G; Toval A
    Annu Int Conf IEEE Eng Med Biol Soc; 2015 Aug; 2015():1389-92. PubMed ID: 26736528
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Impacts of mobile tablet computing on provider productivity, communications, and the process of care.
    Schooley B; Walczak S; Hikmet N; Patel N
    Int J Med Inform; 2016 Apr; 88():62-70. PubMed ID: 26878764
    [TBL] [Abstract][Full Text] [Related]  

  • 11. m-Health: A Critical Analysis of Awareness, Perception, and Attitude of Healthcare Among Providers in Himachal Pradesh, North India.
    Ganapathy K; Kanwar V; Bhatnagar T; Uthayakumaran N
    Telemed J E Health; 2016 Aug; 22(8):675-88. PubMed ID: 26859179
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Third-year medical students' knowledge of privacy and security issues concerning mobile devices.
    Whipple EC; Allgood KL; Larue EM
    Med Teach; 2012; 34(8):e532-48. PubMed ID: 22489969
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Hospital Bring-Your-Own-Device Security Challenges and Solutions: Systematic Review of Gray Literature.
    Wani TA; Mendoza A; Gray K
    JMIR Mhealth Uhealth; 2020 Jun; 8(6):e18175. PubMed ID: 32554388
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Pharmacy students' use and perceptions of Apple mobile devices incorporated into a basic health science laboratory.
    Bryant JE; Richard CAH
    Curr Pharm Teach Learn; 2017; 9(1):78-83. PubMed ID: 29180159
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Comprehensive systematic review of healthcare workers' perceptions of risk and use of coping strategies towards emerging respiratory infectious diseases.
    Koh Y; Hegney DG; Drury V
    Int J Evid Based Healthc; 2011 Dec; 9(4):403-19. PubMed ID: 22093389
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Healthcare Data Breaches: Implications for Digital Forensic Readiness.
    Chernyshev M; Zeadally S; Baig Z
    J Med Syst; 2018 Nov; 43(1):7. PubMed ID: 30488291
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Security Techniques for the Electronic Health Records.
    Kruse CS; Smith B; Vanderlinden H; Nealand A
    J Med Syst; 2017 Aug; 41(8):127. PubMed ID: 28733949
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Security Issues for Mobile Medical Imaging: A Primer.
    Choudhri AF; Chatterjee AR; Javan R; Radvany MG; Shih G
    Radiographics; 2015 Oct; 35(6):1814-24. PubMed ID: 26466188
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Who Is Smart with Their Smartphones? Determinants of Smartphone Security Behavior.
    Knapova L; Kruzikova A; Dedkova L; Smahel D
    Cyberpsychol Behav Soc Netw; 2021 Sep; 24(9):584-592. PubMed ID: 34152852
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Security Attacks and Solutions in Electronic Health (E-health) Systems.
    Zeadally S; Isaac JT; Baig Z
    J Med Syst; 2016 Dec; 40(12):263. PubMed ID: 27730389
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 9.